Changing Dynamics in Healthcare Cybersecurity

Imperative for Protecting Patient Information Driving Need for New Solutions

USD 1,500.00

* Required Fields

USD 1,500.00


Be the first to review this product

This research takes into account changing dynamics in the hospital environment, particular to the rise of the Internet of Medical Things and connected medical devices. Cyberattacks related to criminal fraud and abuse as well as data breaches have increased significantly within the healthcare industry from the past few years, and portend specific risks for hospital based medical technologies that increasingly are required to support connected functionalities. Healthcare organizations are now implementing security services aimed at finding the right balance between controlling security costs, deterring attacks, and promoting a productive work environment. Newer cybersecurity solutions from innovative participant

Table of Contents

Cyber Security Threats and Medical Device ConnectivityExecutive SummaryExecutive Summary—Key FindingsResearch ScopeThe Key Questions that this Study will AnswerIntroduction to Cybersecurity for Medical DevicesWhat is Cybersecurity for Medical Devices?Types of Hackers Attacking Networked Medical DevicesHospital with Vulnerable Medical Devices/SystemsPotential Future Risk Scenarios through Use of Medical Devices/SystemsConnected Medical Devices—Associated RisksWhy Invest Additional Time and Money on Cybersecurity for Networked Medical Devices?Potential Future Risk Scenarios/Implications through Medical TechnologiesSocial Engineering—A (new) Way of Hacking a HospitalSocial Engineering—Case Study: Social MediaSocial Engineering—Case Study: Hospital PremisesSocial Engineering—Case Study: Whaling (CEO Fraud)Past AttacksPast AttacksPast Attacks—MedtronicPast Attacks—St. Joseph Health SystemPast Attacks—AnthemPast Attacks—Hollywood Presbyterian Medical CenterKey Takeaways from these AttacksThe Verizon Data Breach Investigations (DBIR) Report—Key TakeawaysKey Takeaways from the Verizon Data Breach Investigations (DBIR) Report—2014 and 2015sKey Takeaways from the Verizon Data Breach Investigations (DBIR) Report—2014 and 2015s (continued)Key Takeaways from the Verizon Data Breach Investigations (DBIR) Report—2014 and 2015s (continued)Key Takeaways from the Verizon Data Breach Investigations (DBIR) Report—2014 and 2015s (continued)FDA Guidance and InitiativesFDA’s Draft Guidance on Premarket Submissions for Cybersecurity Risks in Medical Devices—Key TakeawaysFDA’s Draft Guidance on Postmarket Management of Cybersecurity Risks in Medical Devices—Key Takeaways Initiatives from the Government and Industry toward Medical Device SecurityNews Affairs—Trend Lines Overs the YearsTop Cybersecurity Companies with Healthcare SolutionsHot Cybersecurity Companies to Watch in 2016 for the Healthcare IndustryHot Cybersecurity Companies to Watch in 2016 for the Healthcare Industry (continued)Clearwater Compliance NexusguardDB Networks TraceSecurity Coalfire SystemsRecommendations and Key ConclusionsRecommendations for the Medical Device ManufacturersRecommendations for the Healthcare OrganizationRecommendations—For the Industry and HospitalsKey ConclusionsConcluding ThoughtsLegal DisclaimerThe Frost & Sullivan StoryThe Frost & Sullivan StoryValue Proposition: Future of Your Company & CareerGlobal PerspectiveIndustry Convergence360º Research PerspectiveImplementation ExcellenceOur Blue Ocean Strategy


Why Frost & Sullivan

Working with the CEO’s growth team to create a vision based on a transformation growth strategy

Creating content-based digital marketing strategies that leverage our research perspective to differentiate and “tell your story”

Tracking over 1000 emerging technologies and analyzing the impact by industry and application to reveal the companies to watch in each sector

The Frost & Sullivan team is based in our 45 global offices and have developed a powerful global understandings of how industries operate on a global level.